首页 > 最新文献

2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW)最新文献

英文 中文
Architectural Support for DevOps in a Neo-Metropolis BDaaS Platform 新城BDaaS平台中DevOps的体系结构支持
Pub Date : 2015-09-28 DOI: 10.1109/SRDSW.2015.14
Hong-Mei Chen, R. Kazman, Serge Haziyev, Valentyn Kropov, Dmitri Chtchourov
Big data as a Service (BDaaS) provides a viable strategy for organizations to implement scalable, tailorable big data infrastructure and applications built on this infrastructure. New trends in the BDaaS market are moving toward an open world model -- what we call the Neo-Metropolis model -- for developing BDaaS platforms. The key to the success of such large-scale technology-agnostic platforms, we posit, is an architectural strategy revolving around microservices and DevOps. This article presents the results of an action research with a Neo-Metropolis BDaaS vendor and illustrates how architectural support for DevOps is critical in achieving desired system qualities and enabling platform success. This research contributes to illuminate best practices of DevOps, and to validate and augment a set of DevOps tactics previously developed, while adding and recategorizing new instances of well-established architectural tactics.
大数据即服务(BDaaS)为组织实现可扩展、可定制的大数据基础设施和构建在此基础设施上的应用程序提供了可行的策略。BDaaS市场的新趋势是朝着开放世界模式——我们称之为新大都市模式——发展BDaaS平台。我们认为,这种与技术无关的大型平台成功的关键是围绕微服务和DevOps的架构策略。本文介绍了对Neo-Metropolis BDaaS供应商进行的行动研究的结果,并说明了DevOps的架构支持在实现所需的系统质量和实现平台成功方面是如何至关重要的。这项研究有助于阐明DevOps的最佳实践,并验证和扩充先前开发的DevOps策略集,同时添加和重新分类已建立的架构策略的新实例。
{"title":"Architectural Support for DevOps in a Neo-Metropolis BDaaS Platform","authors":"Hong-Mei Chen, R. Kazman, Serge Haziyev, Valentyn Kropov, Dmitri Chtchourov","doi":"10.1109/SRDSW.2015.14","DOIUrl":"https://doi.org/10.1109/SRDSW.2015.14","url":null,"abstract":"Big data as a Service (BDaaS) provides a viable strategy for organizations to implement scalable, tailorable big data infrastructure and applications built on this infrastructure. New trends in the BDaaS market are moving toward an open world model -- what we call the Neo-Metropolis model -- for developing BDaaS platforms. The key to the success of such large-scale technology-agnostic platforms, we posit, is an architectural strategy revolving around microservices and DevOps. This article presents the results of an action research with a Neo-Metropolis BDaaS vendor and illustrates how architectural support for DevOps is critical in achieving desired system qualities and enabling platform success. This research contributes to illuminate best practices of DevOps, and to validate and augment a set of DevOps tactics previously developed, while adding and recategorizing new instances of well-established architectural tactics.","PeriodicalId":415692,"journal":{"name":"2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122743482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
On the Use of Mobile GPU for Accelerating Malware Detection Using Trace Analysis 基于跟踪分析的移动GPU加速恶意软件检测
Pub Date : 2015-09-28 DOI: 10.1109/SRDSW.2015.18
Manel Abdellatif, C. Talhi, A. Hamou-Lhadj, M. Dagenais
Malware detection on mobile phones involves analysing and matching large amount of data streams against a set of known malware signatures. Unfortunately, as the number of threats grows continuously, the number of malware signatures grows proportionally. This is time consuming and leads to expensive computation costs, especially for mobile devices where memory, power and computation capabilities are limited. As the security threat level is getting worse, parallel computation capabilities for mobile phones is getting better with the evolution of mobile graphical processing units (GPUs). In this paper, we discuss how we can benefit from the evolving parallel processing capabilities of mobile devices in order to accelerate malware detection on Android mobile phones. We have designed and implemented a parallel host-based anti-malware for mobile devices that exploits the computation capabilities of mobile GPUs. A series of computation and memory optimization techniques are proposed to increase the detection throughput. The results suggest that mobile graphic cards can be used effectively to accelerate malware detection for mobile phones.
手机上的恶意软件检测包括分析和匹配大量数据流与一组已知的恶意软件签名。不幸的是,随着威胁数量的不断增长,恶意软件签名的数量也成比例地增长。这既耗时又会导致昂贵的计算成本,特别是对于内存、功率和计算能力有限的移动设备。随着安全威胁程度的日益严重,随着移动图形处理单元(gpu)的发展,手机的并行计算能力也在不断提高。在本文中,我们讨论了如何从移动设备不断发展的并行处理能力中获益,以加速Android手机上的恶意软件检测。我们为移动设备设计并实现了一个并行的基于主机的反恶意软件,它利用了移动gpu的计算能力。为了提高检测吞吐量,提出了一系列的计算和内存优化技术。结果表明,移动显卡可以有效地加速手机恶意软件的检测。
{"title":"On the Use of Mobile GPU for Accelerating Malware Detection Using Trace Analysis","authors":"Manel Abdellatif, C. Talhi, A. Hamou-Lhadj, M. Dagenais","doi":"10.1109/SRDSW.2015.18","DOIUrl":"https://doi.org/10.1109/SRDSW.2015.18","url":null,"abstract":"Malware detection on mobile phones involves analysing and matching large amount of data streams against a set of known malware signatures. Unfortunately, as the number of threats grows continuously, the number of malware signatures grows proportionally. This is time consuming and leads to expensive computation costs, especially for mobile devices where memory, power and computation capabilities are limited. As the security threat level is getting worse, parallel computation capabilities for mobile phones is getting better with the evolution of mobile graphical processing units (GPUs). In this paper, we discuss how we can benefit from the evolving parallel processing capabilities of mobile devices in order to accelerate malware detection on Android mobile phones. We have designed and implemented a parallel host-based anti-malware for mobile devices that exploits the computation capabilities of mobile GPUs. A series of computation and memory optimization techniques are proposed to increase the detection throughput. The results suggest that mobile graphic cards can be used effectively to accelerate malware detection for mobile phones.","PeriodicalId":415692,"journal":{"name":"2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121739807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secure Dissemination of Video Data in Vehicle-to-Vehicle Systems 车对车系统中视频数据的安全传播
Pub Date : 2015-09-28 DOI: 10.1109/SRDSW.2015.22
Chenyang Qu, D. Ulybyshev, B. Bhargava, R. Ranchal, L. Lilien
Data exchange between vehicles and base stations may contain information on traffic accidents, traffic jams, road constructions etc. Risks to data privacy in vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) systems need be minimized. We present a policybased solution that provides controlled and privacypreserving dissemination of video data in V2V and V2I. This policy-based solution relies on Active Bundle (AB), which incorporates policy enforcement mechanism and policies that describe access to video data. The usage of ABs ensures privacy of actors during disclosure of captured video in untrusted environment. Face recognition algorithm is used to identify sensitive data in videos and it is used in policies. We use four algorithms to process images that are captured by a vehicle's camera.
车辆与基站之间的数据交换可能包含交通事故、交通堵塞、道路建设等信息。车辆对车辆(V2V)和车辆对基础设施(V2I)系统中的数据隐私风险需要最小化。我们提出了一个基于策略的解决方案,该解决方案提供了V2V和V2I中视频数据的受控和隐私保护传播。这种基于策略的解决方案依赖于Active Bundle (AB),它结合了策略实施机制和描述视频数据访问的策略。ABs的使用确保了参与者在不可信环境中披露捕获视频时的隐私。人脸识别算法用于识别视频中的敏感数据,并应用于策略中。我们使用四种算法来处理车辆摄像头拍摄的图像。
{"title":"Secure Dissemination of Video Data in Vehicle-to-Vehicle Systems","authors":"Chenyang Qu, D. Ulybyshev, B. Bhargava, R. Ranchal, L. Lilien","doi":"10.1109/SRDSW.2015.22","DOIUrl":"https://doi.org/10.1109/SRDSW.2015.22","url":null,"abstract":"Data exchange between vehicles and base stations may contain information on traffic accidents, traffic jams, road constructions etc. Risks to data privacy in vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) systems need be minimized. We present a policybased solution that provides controlled and privacypreserving dissemination of video data in V2V and V2I. This policy-based solution relies on Active Bundle (AB), which incorporates policy enforcement mechanism and policies that describe access to video data. The usage of ABs ensures privacy of actors during disclosure of captured video in untrusted environment. Face recognition algorithm is used to identify sensitive data in videos and it is used in policies. We use four algorithms to process images that are captured by a vehicle's camera.","PeriodicalId":415692,"journal":{"name":"2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129341241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Building Secure Applications Using Pattern-Based Design Fragments 使用基于模式的设计片段构建安全的应用程序
Pub Date : 2015-09-28 DOI: 10.1109/SRDSW.2015.12
Paul Rimba, Liming Zhu, Xiwei Xu, Daniel W. Sun
Developing and operating a complex secure application with high assurance is difficult and requires experts. Security patterns and best practices have been proposed to assist architects in designing secure applications. However, these are usually written independently of the underlying platforms and operating environment. This leads to a gap between patterns and the platforms, and does not directly support the design-level analysis and verification of systems to be built on those platforms. We propose an approach to incrementally build an application design using design fragments, which are specializations of patterns for target platforms. Design fragments can be composed and reused during design, and directly support design-level security analyses and operation level concerns. We apply this approach in a case study of the design and analysis of a smart electricity meter. We show how the approach can be used to iteratively address threats.
开发和操作具有高保证的复杂安全应用程序是困难的,需要专家。已经提出了安全模式和最佳实践来帮助架构师设计安全的应用程序。然而,这些通常是独立于底层平台和操作环境编写的。这导致了模式和平台之间的差距,并且不能直接支持在这些平台上构建的系统的设计级分析和验证。我们提出了一种使用设计片段(设计片段是针对目标平台的模式专门化)增量构建应用程序设计的方法。设计片段可以在设计期间进行组合和重用,并直接支持设计级安全分析和操作级关注。我们将此方法应用于智能电表设计和分析的案例研究中。我们展示了如何使用该方法迭代地处理威胁。
{"title":"Building Secure Applications Using Pattern-Based Design Fragments","authors":"Paul Rimba, Liming Zhu, Xiwei Xu, Daniel W. Sun","doi":"10.1109/SRDSW.2015.12","DOIUrl":"https://doi.org/10.1109/SRDSW.2015.12","url":null,"abstract":"Developing and operating a complex secure application with high assurance is difficult and requires experts. Security patterns and best practices have been proposed to assist architects in designing secure applications. However, these are usually written independently of the underlying platforms and operating environment. This leads to a gap between patterns and the platforms, and does not directly support the design-level analysis and verification of systems to be built on those platforms. We propose an approach to incrementally build an application design using design fragments, which are specializations of patterns for target platforms. Design fragments can be composed and reused during design, and directly support design-level security analyses and operation level concerns. We apply this approach in a case study of the design and analysis of a smart electricity meter. We show how the approach can be used to iteratively address threats.","PeriodicalId":415692,"journal":{"name":"2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW)","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134634329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks 初始目标位置对机会资源利用网络无人机监视性能的影响
Pub Date : 2015-09-28 DOI: 10.1109/SRDSW.2015.11
L. Lilien, L. B. Othmane, Pelin Angin, B. Bhargava, Raed M. Salih, A. DeCarlo
We propose application of Opportunistic Resource Utilization Networks (Oppnets), a novel type of Mobile Ad Hoc NETworks (MANETs), for ad hoc networking of Unmanned Aerial Vehicles (UAVs) in surveillance missions. Oppnets provide effective resource virtualization and adaption to highly dynamic and unstable nature of MANETs. They can be viewed as middleware to facilitate building flexible and adaptive distributed systems that provide all kinds of resources or services to the requesting application via the so called helper mechanism. The simulation study focuses on the impact of an initial target position on the performance of Oppnet-based UAV surveillance systems. We find that detection success ratios and time to detect a target are negligibly affected by the initial target position in the surveillance area when UAVs expand up their Oppnet quickly, but strongly affected by the initial target position when UAVs are slow in building up their Oppnet.
我们提出机会资源利用网络(Oppnets),一种新型的移动自组织网络(manet),用于无人驾驶飞行器(uav)在监视任务中的自组织网络。Oppnets提供了有效的资源虚拟化和适应manet的高动态性和不稳定性。它们可以被视为中间件,以促进构建灵活和自适应的分布式系统,这些系统通过所谓的助手机制向请求应用程序提供各种资源或服务。仿真研究的重点是初始目标位置对基于oppnet的无人机监视系统性能的影响。研究发现,当无人机快速扩张Oppnet时,目标初始位置对目标探测成功率和探测时间的影响可以忽略不计,而当无人机缓慢扩张Oppnet时,目标初始位置对目标探测成功率和探测时间的影响较大。
{"title":"Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks","authors":"L. Lilien, L. B. Othmane, Pelin Angin, B. Bhargava, Raed M. Salih, A. DeCarlo","doi":"10.1109/SRDSW.2015.11","DOIUrl":"https://doi.org/10.1109/SRDSW.2015.11","url":null,"abstract":"We propose application of Opportunistic Resource Utilization Networks (Oppnets), a novel type of Mobile Ad Hoc NETworks (MANETs), for ad hoc networking of Unmanned Aerial Vehicles (UAVs) in surveillance missions. Oppnets provide effective resource virtualization and adaption to highly dynamic and unstable nature of MANETs. They can be viewed as middleware to facilitate building flexible and adaptive distributed systems that provide all kinds of resources or services to the requesting application via the so called helper mechanism. The simulation study focuses on the impact of an initial target position on the performance of Oppnet-based UAV surveillance systems. We find that detection success ratios and time to detect a target are negligibly affected by the initial target position in the surveillance area when UAVs expand up their Oppnet quickly, but strongly affected by the initial target position when UAVs are slow in building up their Oppnet.","PeriodicalId":415692,"journal":{"name":"2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117336923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
SMS Botnet Detection for Android Devices through Intent Capture and Modeling 基于意图捕获和建模的Android设备短信僵尸网络检测
Pub Date : 2015-09-28 DOI: 10.1109/SRDSW.2015.21
Erik Johnson, I. Traoré
Mobile devices are subject to an increased attack surface vector as compared to desktop computing, due to the nature of sensors, radios, and increased peripherals. We investigate in this work mobile botnets with a specific focus on Android, which is the most widely adopted mobile platform, and a prime target for malicious software, 79% of reported malware threats to mobile operating systems are targeted at Android. Our analysis focuses on a short messaging service (SMS) botnet structure and investigates a new detection model using the concept of intents. We show that transparent control can be achieved by a remote endpoint, yet also detected by our proposed intent detection model. Intents are late run-time bindings mechanisms provided to applications in the Android operating system. Intents provide a clear and accurate picture of device behaviour with external sources, due to their design as a late run time binding mechanism in the Android Operating System. We propose an intent logging system to capture sample data, and use this as the basis to design and evaluate our proposed detection scheme.
与桌面计算相比,由于传感器、无线电和外设的特性,移动设备受到的攻击面向量增加。在这项工作中,我们调查了移动僵尸网络,特别关注Android,这是最广泛采用的移动平台,也是恶意软件的主要目标,79%的移动操作系统恶意软件威胁是针对Android的。我们的分析侧重于短消息服务(SMS)僵尸网络结构,并研究了一种使用意图概念的新检测模型。我们表明,透明控制可以通过远程端点实现,但也可以通过我们提出的意图检测模型进行检测。intent是Android操作系统中提供给应用程序的后期运行时绑定机制。由于intent被设计为Android操作系统的一种后期运行时绑定机制,所以它能够通过外部资源清晰而准确地描述设备行为。我们提出了一个意图测井系统来捕获样本数据,并以此为基础来设计和评估我们提出的检测方案。
{"title":"SMS Botnet Detection for Android Devices through Intent Capture and Modeling","authors":"Erik Johnson, I. Traoré","doi":"10.1109/SRDSW.2015.21","DOIUrl":"https://doi.org/10.1109/SRDSW.2015.21","url":null,"abstract":"Mobile devices are subject to an increased attack surface vector as compared to desktop computing, due to the nature of sensors, radios, and increased peripherals. We investigate in this work mobile botnets with a specific focus on Android, which is the most widely adopted mobile platform, and a prime target for malicious software, 79% of reported malware threats to mobile operating systems are targeted at Android. Our analysis focuses on a short messaging service (SMS) botnet structure and investigates a new detection model using the concept of intents. We show that transparent control can be achieved by a remote endpoint, yet also detected by our proposed intent detection model. Intents are late run-time bindings mechanisms provided to applications in the Android operating system. Intents provide a clear and accurate picture of device behaviour with external sources, due to their design as a late run time binding mechanism in the Android Operating System. We propose an intent logging system to capture sample data, and use this as the basis to design and evaluate our proposed detection scheme.","PeriodicalId":415692,"journal":{"name":"2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129828332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Exactly-Once Quantity Transfer 精确一次数量转移
Pub Date : 2015-09-28 DOI: 10.1109/SRDSW.2015.10
Ali Shoker, Paulo Sérgio Almeida, Carlos Baquero
Strongly consistent systems supporting distributed transactions can be prone to high latency and do not tolerate partitions. The present trend of using weaker forms of consistency, to achieve high availability, poses notable challenges in writing applications due to the lack of linearizability, e.g., to ensure global invariants, or perform mutator operations on a distributed datatype. This paper addresses a specific problem: the exactly-once transfer of a "quantity" from one node to another on an unreliable network (coping with message duplication, loss, or reordering) and without any form of global synchronization. This allows preserving a global property (the sum of quantities remains unchanged) without requiring global linearizability and only through using pairwise interactions between nodes, therefore allowing partitions in the system. We present the novel quantity-transfer algorithm while focusing on a specific use-case: a redistribution protocol to keep the quantities in a set of nodes balanced, in particular, averaging a shared real number across nodes. Since this is a work in progress, we briefly discuss the correctness of the protocol, and we leave potential extensions and empirical evaluations for future work.
支持分布式事务的强一致性系统可能容易出现高延迟,并且不容忍分区。目前的趋势是使用较弱形式的一致性来实现高可用性,由于缺乏线性性,例如,确保全局不变性,或在分布式数据类型上执行mutator操作,因此在编写应用程序时提出了显著的挑战。本文解决了一个特定的问题:在不可靠的网络上,在没有任何形式的全局同步的情况下,将“数量”从一个节点精确地一次传输到另一个节点(应对消息重复、丢失或重新排序)。这允许保留一个全局属性(数量的总和保持不变),而不需要全局线性化,并且只通过使用节点之间的成对交互,因此允许在系统中分区。我们提出了一种新的数量转移算法,同时专注于一个特定的用例:一种重新分配协议,以保持一组节点中的数量平衡,特别是在节点之间平均共享实数。由于这是一项正在进行的工作,我们简要地讨论了协议的正确性,并将潜在的扩展和经验评估留给未来的工作。
{"title":"Exactly-Once Quantity Transfer","authors":"Ali Shoker, Paulo Sérgio Almeida, Carlos Baquero","doi":"10.1109/SRDSW.2015.10","DOIUrl":"https://doi.org/10.1109/SRDSW.2015.10","url":null,"abstract":"Strongly consistent systems supporting distributed transactions can be prone to high latency and do not tolerate partitions. The present trend of using weaker forms of consistency, to achieve high availability, poses notable challenges in writing applications due to the lack of linearizability, e.g., to ensure global invariants, or perform mutator operations on a distributed datatype. This paper addresses a specific problem: the exactly-once transfer of a \"quantity\" from one node to another on an unreliable network (coping with message duplication, loss, or reordering) and without any form of global synchronization. This allows preserving a global property (the sum of quantities remains unchanged) without requiring global linearizability and only through using pairwise interactions between nodes, therefore allowing partitions in the system. We present the novel quantity-transfer algorithm while focusing on a specific use-case: a redistribution protocol to keep the quantities in a set of nodes balanced, in particular, averaging a shared real number across nodes. Since this is a work in progress, we briefly discuss the correctness of the protocol, and we leave potential extensions and empirical evaluations for future work.","PeriodicalId":415692,"journal":{"name":"2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132542361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Client-Based Replication Protocol for Multiversion Cloud File Storage 基于客户端的多版本云文件存储复制协议
Pub Date : 2015-09-28 DOI: 10.1109/SRDSW.2015.17
Mamoru Ohara, S. Fukumoto
In recent years, data replication have received attention in terms of tolerance for large-scale disasters. Also, file versioning features, by which more than one version of a file can be maintained, have been commercially available in some storage services. For providing file versioning with limited storage resources, it is essential to divide the resources among versions in accordance with the varied needs of numerous users. In this paper, we focus on applications in which newer versions of a file are more likely to be requested, which may be true in the case of many subscription services. We propose a new distributed data replication protocol supporting the file versioning feature. In order to eliminate a single point of failure, replica nodes themselves do not know about which nodes hold the newest version, instead, clients dynamically search the nodes having the required version in read/write operations. We also construct an analytical model that can derive an optimal allocation of the resources when the total number of replica nodes in a system and the distribution of the frequency of read requests for each version are given. In addition, we present some numerical examples obtained by simulations to show the good scalability and dependability of our system by assuming some realistic parameters.
近年来,数据复制在对大规模灾难的容忍度方面受到了关注。此外,文件版本控制功能(通过该功能可以维护一个文件的多个版本)在一些存储服务中已经商业化。为了在有限的存储资源下提供文件版本控制,必须根据众多用户的不同需求将资源划分为不同的版本。在本文中,我们关注的是更有可能请求文件的新版本的应用程序,这在许多订阅服务的情况下可能是正确的。我们提出了一种支持文件版本控制特性的分布式数据复制协议。为了消除单点故障,副本节点本身并不知道哪些节点拥有最新版本,相反,客户机在读/写操作中动态搜索具有所需版本的节点。我们还构建了一个分析模型,当系统中副本节点总数和每个版本的读请求频率分布给定时,可以推导出资源的最优分配。此外,文中还给出了一些仿真算例,通过对实际参数的假设,说明了系统具有良好的可扩展性和可靠性。
{"title":"A Client-Based Replication Protocol for Multiversion Cloud File Storage","authors":"Mamoru Ohara, S. Fukumoto","doi":"10.1109/SRDSW.2015.17","DOIUrl":"https://doi.org/10.1109/SRDSW.2015.17","url":null,"abstract":"In recent years, data replication have received attention in terms of tolerance for large-scale disasters. Also, file versioning features, by which more than one version of a file can be maintained, have been commercially available in some storage services. For providing file versioning with limited storage resources, it is essential to divide the resources among versions in accordance with the varied needs of numerous users. In this paper, we focus on applications in which newer versions of a file are more likely to be requested, which may be true in the case of many subscription services. We propose a new distributed data replication protocol supporting the file versioning feature. In order to eliminate a single point of failure, replica nodes themselves do not know about which nodes hold the newest version, instead, clients dynamically search the nodes having the required version in read/write operations. We also construct an analytical model that can derive an optimal allocation of the resources when the total number of replica nodes in a system and the distribution of the frequency of read requests for each version are given. In addition, we present some numerical examples obtained by simulations to show the good scalability and dependability of our system by assuming some realistic parameters.","PeriodicalId":415692,"journal":{"name":"2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122002557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hard Drive Failure Prediction Using Big Data 基于大数据的硬盘故障预测
Pub Date : 2015-09-28 DOI: 10.1109/SRDSW.2015.15
Wenjun Yang, Dianming Hu, Yuliang Liu, Shuhao Wang, Tianming Jiang
We design a general framework named Hdoctor for hard drive failure prediction. Hdoctor leverages the power of big data to achieve a significant improvement comparing to all previous researches that used sophisticated machine learning algorithms. Hdoctor exhibits a series of engineering innovations: (1) constructing time dependent features to characterize the Self-Monitoring, Analysis and Reporting Technology (SMART) value transitions during disk failures, (2) combining features to enable the model to learn the correlation among different SMART attributes, (3) regarding circumstance data such as cluster workload, temperature, humidity, location as related features. Meanwhile, Hdoctor collects/labels samples and updates model automatically, and works well for all kinds of disk failure prediction in our intelligent data center. In this work, we use Hdoctor to collect 74,477,717 training records from our clusters involving 220,022 disks. By training a simple and scalable model, our system achieves a detection rate of 97.82%, with a false alarm rate (FAR) of 0.3%, which hugely outperforms all previous algorithms. In addition, Hdoctor is an excellent indicator for how to predict different hardware failures efficiently under various circumstances.
设计了一个用于硬盘故障预测的通用框架Hdoctor。与之前所有使用复杂机器学习算法的研究相比,Hdoctor利用大数据的力量实现了显著的改进。Hdoctor展示了一系列工程创新:(1)构建时间相关特征来表征磁盘故障时SMART (Self-Monitoring, Analysis and Reporting Technology)的值转换;(2)组合特征使模型能够学习不同SMART属性之间的相关性;(3)将集群工作负载、温度、湿度、位置等环境数据作为相关特征。同时,Hdoctor可以自动采集/标记样本并更新模型,可以很好地用于我们智能数据中心的各种磁盘故障预测。在这项工作中,我们使用Hdoctor从涉及220,022个磁盘的集群中收集了74,477,717条训练记录。通过训练一个简单且可扩展的模型,我们的系统实现了97.82%的检测率,虚警率(FAR)为0.3%,大大优于以前的所有算法。此外,对于如何在各种情况下有效地预测不同的硬件故障,Hdoctor是一个很好的指示器。
{"title":"Hard Drive Failure Prediction Using Big Data","authors":"Wenjun Yang, Dianming Hu, Yuliang Liu, Shuhao Wang, Tianming Jiang","doi":"10.1109/SRDSW.2015.15","DOIUrl":"https://doi.org/10.1109/SRDSW.2015.15","url":null,"abstract":"We design a general framework named Hdoctor for hard drive failure prediction. Hdoctor leverages the power of big data to achieve a significant improvement comparing to all previous researches that used sophisticated machine learning algorithms. Hdoctor exhibits a series of engineering innovations: (1) constructing time dependent features to characterize the Self-Monitoring, Analysis and Reporting Technology (SMART) value transitions during disk failures, (2) combining features to enable the model to learn the correlation among different SMART attributes, (3) regarding circumstance data such as cluster workload, temperature, humidity, location as related features. Meanwhile, Hdoctor collects/labels samples and updates model automatically, and works well for all kinds of disk failure prediction in our intelligent data center. In this work, we use Hdoctor to collect 74,477,717 training records from our clusters involving 220,022 disks. By training a simple and scalable model, our system achieves a detection rate of 97.82%, with a false alarm rate (FAR) of 0.3%, which hugely outperforms all previous algorithms. In addition, Hdoctor is an excellent indicator for how to predict different hardware failures efficiently under various circumstances.","PeriodicalId":415692,"journal":{"name":"2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW)","volume":"11 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116114743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Selective Hearing: An Approach to Distributed, Eventually Consistent Edge Computation 选择性听力:一种分布式,最终一致的边缘计算方法
Pub Date : 2015-09-28 DOI: 10.1109/SRDSW.2015.9
Christopher S. Meiklejohn, P. V. Roy
We present a new programming model for large-scale mobile and "Internet of Things" style distributed applications. The model consists of two layers: a language layer based on the Lasp language with a runtime layer based on epidemic broadcast. The Lasp layer provides deterministic coordination-free computation primitives based on conflict-free replicated data types (CRDTs). The epidemic broadcast layer is based on the Plumtree protocol. It provides a communication framework where clients may only have a partial view of membership and may not want to participate in or have knowledge of all active computations. We motivate the new model with a nontrivial mobile application, a distributed ad counter, and we give the model's formal semantics.
我们提出了一种新的大规模移动和“物联网”式分布式应用程序的编程模型。该模型由两层组成:基于Lasp语言的语言层和基于疫情广播的运行时层。Lasp层基于无冲突复制数据类型(crdt)提供确定性的无协调计算原语。流行病广播层基于Plumtree协议。它提供了一个通信框架,在这个框架中,客户机可能只拥有成员关系的部分视图,并且可能不想参与或了解所有活动计算。我们用一个重要的移动应用程序,一个分布式广告计数器来激励新模型,并给出模型的形式语义。
{"title":"Selective Hearing: An Approach to Distributed, Eventually Consistent Edge Computation","authors":"Christopher S. Meiklejohn, P. V. Roy","doi":"10.1109/SRDSW.2015.9","DOIUrl":"https://doi.org/10.1109/SRDSW.2015.9","url":null,"abstract":"We present a new programming model for large-scale mobile and \"Internet of Things\" style distributed applications. The model consists of two layers: a language layer based on the Lasp language with a runtime layer based on epidemic broadcast. The Lasp layer provides deterministic coordination-free computation primitives based on conflict-free replicated data types (CRDTs). The epidemic broadcast layer is based on the Plumtree protocol. It provides a communication framework where clients may only have a partial view of membership and may not want to participate in or have knowledge of all active computations. We motivate the new model with a nontrivial mobile application, a distributed ad counter, and we give the model's formal semantics.","PeriodicalId":415692,"journal":{"name":"2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116278579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1